Lightlesscan

Malware updated 7 months ago (2024-05-04T20:40:38.083Z)
Download STIX
Preview STIX
LightlessCan is a new and advanced malware, discovered by ESET, that has been added to North Korea's Lazarus group's arsenal. The malware is a successor to the group's flagship HTTP(S) Lazarus Remote Access Trojan (RAT) named BlindingCan. LightlessCan represents a significant advancement in malicious capabilities compared to its predecessor, with ESET's senior malware researcher, Peter Kálnai, noting that it mimics the functionalities of a broad range of native Windows commands. This allows for discreet execution within the RAT itself, making detection and analysis of attacker activities more challenging. The threat actor initially gained access to company systems through a spear-phishing attack masquerading as a recruiter for Facebook parent company Meta. Once inside the system, they deployed the LightlessCan malware. One of the most notable aspects of this RAT is its ability to mimic commands like ping, ipconfig, systeminfo, sc, net, and others with a hardcoded "The operation completed successfully" string as output. This obfuscates the reality of what the RAT is doing, adding another layer of complexity to its operations. ESET's analysts believe that LightlessCan is based on the source code of BlindingCan due to the significant preservation of the order of shared commands, despite some differences in their indexing. In developing LightlessCan, Lazarus may have reverse-engineered the closed-source system binaries to add additional functionality to the RAT. In a recent attack documented by ESET, LightlessCan demonstrated support for 68 commands, although only 43 appear to be implemented. The discovery of this malware came after Lazarus Group impersonated a Meta recruiter on LinkedIn to target a Spain-based aerospace firm with the LightlessCan malware.
Description last updated: 2024-05-04T16:53:28.826Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Rat
Eset
Payload
Windows
Malware
Downloader
Implant
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The BLINDINGCAN Malware is associated with Lightlesscan. BlindingCan, also known as AIRDRY or ZetaNile, is a multifaceted malware capable of extracting sensitive data from compromised hosts. The threat actor gained initial access to systems via spear-phishing attacks masquerading as recruiters for high-profile companies and deployed new malware dubbed "LiUnspecified
4
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Lazarus Group Threat Actor is associated with Lightlesscan. The Lazarus Group, a notorious North Korean state-sponsored threat actor, is among the most prolific and dangerous cyber threat actors in operation. The group has been involved in several high-profile cyber-attacks, including Operation DreamJob in Spain, with the primary objective of funding North KUnspecified
3
Source Document References
Information about the Lightlesscan Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
BankInfoSecurity
a year ago
CERT-EU
a year ago
ESET
a year ago
DARKReading
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago